Proceedings of the 2018 3rd International Conference on Communications, Information Management and Network Security (CIMNS 2018)

Session: Communications Engineering and Network Security

14 articles
Proceedings Article

Resource Allocation Algorithm Based on Multi-objective Optimization in D2D Communication

Xueying Han, Yi Sun
At present, the algorithm for solving the problem of resource sharing in D2D communication and cellular communication in cellular networks is mostly optimized for a single target. This paper proposes a general resource allocation algorithm based on multi-objective optimization, which optimizes system...
Proceedings Article

Design of Analog Circuit for Radar Video Echo

Chunyu Shao, Xuezhi Zhang, Cun Xie
Radar plays a more and more important role in modern war. Many countries have invested a lot of manpower and material resources in radar technology research and development. The radar echo is simulated with modern electronic technology and computer digital simulation technology in order to debug and...
Proceedings Article

A Novel Sub-regional Key Management Scheme for Distributed Wireless Sensor Network

Yinghong Liu, Yuanming Wu
Encryption technique is one of the key technologies in wireless sensor networks. In this paper, a novel key management scheme of sub-regional based on bivariate symmetric polynomial key is proposed for distributed wireless sensor network (WSN). A certain amount of bivariate symmetric polynomials are...
Proceedings Article

Traffic Model for Teleconsultation Based on the Service Characteristics

Xin Yang, Ningbo Zhang, Guixia Kang
The rapid development of numerous emerging network services poses a challenge to the network resources allocation with their bandwidth requirements and statistical characteristics. Network traffic modeling plays an important role in network resources allocation which can be used to guarantee Quality-of-Service...
Proceedings Article

Research and Exploration on a New Method of Finding the Blocking Probability

Fan Bu, Yi Sun
This electronic document is the exploration of using the blocking probability without the wavelength conversion link to predict the blocking probability with the wavelength conversion
Proceedings Article

Dynamic Bandwidth Allocation in WDM-PON Based Mobile Fronthaul

Chunlei Zhang, Gangming Zhao, Chenxi Zhang, Xunfa Yang
Wavelength division multiplexing passive optical network (WDM-PON) is an important alternative technique for 5G mobile fronthaul due to the large bandwidth and low latency. Wavelength and bandwidth allocation algorithm is very important in WDM-PON. In this paper, a dynamic wavelength and bandwidth allocation...
Proceedings Article

A Frame-Based Extended MIDI-Pitch Detection Algorithm Based on Variable Sampling Technology

Yin Feng, Mingtai Lin
This paper proposes a framed-based extended MIDI-pitch detection algorithm based on variable sampling technology. Symbols P--, P-, P+ and P++ are used to present four different logarithmic frequencies around the MIDI pitch P (integer) within 100 cents interval and called as extended MIDI-pitch to enhance...
Proceedings Article

A Lightweight Traffic Anomaly Detection Model in SDN Based on Decision Tree

Dong Li, Zizhun Li
This paper establishes a SDN-based network traffic anomaly detection model based on decision tree. Firstly, five statistical indexes are presented to describe the behavior of network traffic, then normal and abnormal traffic data to train the machine learning model to detect traffic anomaly. Four machine...
Proceedings Article

Active Learning in Cyberspace Security

Pengfei Zhang, Zhenyan Liu, Jia Cui, Jingfeng Xue, Xinfan Cai, Xiaolei Yang
At present, machine learning, especially active learning in machine learning, is introduced in cyberspace security field. In this paper, we first analyze the background of cyberspace security and profile active learning. And then we focus on a survey on the application research of active learning in...
Proceedings Article

Exploration and Research on Prediction Methods of Web Service QoS

Chengcheng Lou, Yi Sun
The web service QoS (quality of service) plays an important role in the evaluation and selection of web services. [1,2,3,4] In previous research on QoS prediction, there is a lack of a model that can dynamically predict the state of web services, and there is no revision of the prediction results. In...
Proceedings Article

Confusion and Relief of Criminal Jurisdiction of Cybercrimes

Jun Li, Jidong Jia
Nowadays cybercrime occurs more and more frequently. However, the traditional criminal jurisdiction system has certain difficulties in investigating it due to the particularity of cybercrime, especially in the criminal jurisdiction of transnational cybercrime. It has seriously restricted the effective...
Proceedings Article

Design of the Core Module of a Key Management Server

Jianyu Ai, Hao Huang, Lei Shi
This paper researches the key management server system to solve the problems of distribution, storage and backup of massive key management under the content association key encryption mechanism, and provides technical support for the application of content association key technology. The core function...
Proceedings Article

Methods of Testing of the Corporate Network’s Traffic Anomalies

Nikita Kulyаsov, Sergey Isaev
This article gives an overview of the existing methods and software products designed to analyze anomalies that may indicate the occurrence of cyber-threats. On their basis, we propose our own original software tool that allows automatic detection of anomalies and subsequent detailed analysis of network...
Proceedings Article

A Priority-Based MAC Protocol for the Terahertz In-Vivo Nano-Networks in the Presence of Noise

Jiali Kan, Juan Xu, Yakun Zhao, Jiaolong Jiang, Yan Zhang
Advances in nanotechnology and sensor networks recent years provide the opportunity for developing Wireless NanoSensor Networks (WNSNs) in the terahertz (THz) band(0.1-10THz). It’s a new challenge for the THz nano-networks to satisfy biomedical applications with a medium access control (MAC) protocol...